The Government’s New Approach to a Storied Research Tradition
The PIF program is also a chance for the government to educate the private sector and public about the importance of federal research, which has spawned watershed technologies.
The PIF program is also a chance for the government to educate the private sector and public about the importance of federal research, which has spawned watershed technologies.
By offering a flexible approach to cybersecurity, the CSF allows agencies to create individualized risk-management plans based on their specific needs and capabilities.
What exactly does the CSF recommend and how can governments use it to tackle their own unique organizational concerns?
Federal agencies often overlook the recovery step of a cyberattack. Given all the energy that agencies must put into detecting, defending and responding to an attack, this omission is understandable, but today more than ever, recovery is critical.
Is the federal government taking threat detection seriously?
We’ve previously talked about adopting the CSF and identifying your most valuable assets and data. Now it’s time to discuss the next phase, Protect, which ensures that data at rest and in transit is secure.
While the future of cloud is certain in government, agencies may be less certain about how to navigate cloud security. But by having the right guidance, frameworks and platforms in place, government agencies can double down on cloud security with confidence.
Effective use of cybersecurity tools can help agencies with risk mitigation.
Here’s what you need to know about NIST’s update to Special Publication 800-53.
Ready to implement NIST’s Cybersecurity Framework at your agency but not sure how? Check out what these cyber experts have to say about customizing the framework to meet your agency’s needs.